Essays about: "thesis in virtual private network"

Showing result 1 - 5 of 32 essays containing the words thesis in virtual private network.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. The Evolvement of the Wireless Industry Capability for Agile Service Production

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gustav Curan; [2023]
    Keywords : 5G; Software-defined networking; SDN; Programming;

    Abstract : Along with the dramatic changes that have happened over the years, from the first-generation (1G) of mobile networks to the current fifth-generation (5G) of mobile networks. A wide range of different technologies has been seen as potential possibilities for changing and improving the 5G networks, whereas Software-defined networking (SDN) has been widely regarded as one of the significant enablers for this possibility. READ MORE

  3. 3. Performance evaluation of VPN solutions in multi-region kubernetes cluster

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Bharani Kumar Yedla; [2023]
    Keywords : Kubernetes; Docker; Virtual Private Network; Wireguard; OpenVPN; SoftEther; Tinc; ZeroTier; Performance evaluations;

    Abstract : Containerization is widely recognized as a form of lightweight virtualization in the cloud. Due to its reliability, maturity, and rich capabilities, kubernetes has established itself as the de-facto standard for deployments and maintenance of containers. READ MORE

  4. 4. RNN-based Graph Neural Network for Credit Load Application leveraging Rejected Customer Cases

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Oskar Nilsson; Benjamin Lilje; [2023]
    Keywords : Machine Learning; Deep Learning; Reject Inference; GNN; GCN; Graph Neural Networks; RNN; Recursive Neural Network; LSTM; Semi-Supervised Learning; Encoding; Decoding; Feature Elimination;

    Abstract : Machine learning plays a vital role in preventing financial losses within the banking industry, and still, a lot of state of the art and industry-standard approaches within the field neglect rejected customer information and the potential information that they hold to detect similar risk behavior.This thesis explores the possibility of including this information during training and utilizing transactional history through an LSTM to improve the detection of defaults. READ MORE

  5. 5. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Christoffer Sandquist; Jon-Erik Ersson; [2023]
    Keywords : Data collection; Website fingerprinting; dataset; traffic analysis; VPN; encrypted traffic; machine learning; deep learning; network measurements; twitch; Datainsamling; Profilering av hemsidor; dataset; trafikanalys; VPN; krypterad trafik; maskininlärning; djupinlärning; nätverksmätningar; twitch;

    Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE